Cyc3704 Assignment 1

Improved Essays
All required textbooks are listed and available for download on the course Syllabus.
Information Security for Non-Technical Managers, E. Gelbstein (2013), pp. 12-71.
Internet and Technology Law: A U.S. Perspective, K. G. Kustron (2015), pp. 25-53.
Law for Computing Students, G. Sampson (2009), pp. 79-101.
Select three examples of where a company’s data security was breached from the outside. What do your examples have in common? What important lessons can the e-business community learn from these events?

Data security breach occurs when sensitive, secured or private information are been accessed or viewed, stolen or used by an individual who hasn’t gotten the authorization to use it. The information acquired during the breach may include
…show more content…
(2013). Information Security for Non-Technical Managers (pp. 12-71). Retrieved December 24, 2015, from http://my.uopeople.edu/pluginfile.php/94498/mod_page/content/22/InformationSecurityForNonTechnicalManagers.pdf
Sampson, G. (2009). Law for Computing Students (pp. 79-101). Retrieved December 24, 2015, from http://my.uopeople.edu/pluginfile.php/94498/mod_page/content/22/LawForComputingStudents.pdf
Kustron, K. G. (2015). Internet and Technology Law: A U.S. Perspective (pp. 25-53). Retrieved December 24, 2015, from http://my.uopeople.edu/pluginfile.php/94498/mod_page/content/22/InternetAndTechnologyLawAUSPerspective.pdf
New Emergency. (n.d.). eBay Hacked: 145 Million Customers Must Change Password. Retrieved December 25, 2015, from http://www.emergencyemail.org/newsemergency/anmviewer.asp?a=3831&z=5
University of California Santa Cruz. (n.d.). Security Breach Examples and Practices to Avoid Them. Retrieved December 24, 2015, from http://its.ucsc.edu/security/breaches.html
Whittaker, Z. (2015, November). These Companies Lost Your Data in 2015 's Biggest Hacks, Breaches 9 - Page 9 | ZDNet. Retrieved December 24, 2015, from

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Study Guide

    • 432 Words
    • 2 Pages

    1. Name three specific cyber issues that have necessitated new laws. 1) Credit card fraud. 2) Cyberstalking. 3) Theft of intellectual property and Identity theft.…

    • 432 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Avmed: Forensic Analysis

    • 294 Words
    • 2 Pages

    In December of 2009 a company named AvMed, which is a Florida based not-for-profit health plan provider, had two laptops stolen (Anderson,2010; “We help our members”, n.d.). One of the laptops was recovered and it contained encrypted patient information. However, the second laptop was not encrypted and it contained names, Social Security numbers, addresses, birthdays and other healthcare information. Initial reports indicated a little over two hundred thousand clients were impacted, but a forensic analysis by Price Waterhouse Coopers revealed that the scope of the data breach may involve 1.2 million customers.…

    • 294 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Disaster Recovery Plan Wichita State Shockerthon is a company focused on creating awareness and support by raising money for the Children’s Miracle Network. Shockerthon uses a database to store many of our clients personal medical information, donor emails, and supporter credit card/debit card information. It is important that Shockerthon creates a plan of action incase the information system is threatened. These threats could arise from natural disasters, security breaches or a virus. Although Shockerthon may not be comparable to Koch Industries, in size, it is imperative to have a plan for any situation concerning the threat of information systems as risking personal information may discredit the reputation Shockerthon has built for itself.…

    • 519 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    The HIPPA Privacy Rule Are medical records really private and is there a difference between the Health Insurance Portability and Accountability Act (HIPPA) and the Privacy Rule? In essence, the two are the same. However, the main difference is that the HIPPA Act, enacted in 1996, was not signed into legislation after the Department of Health and Human Services (DHHS) applied pressure to enforce the privacy issues within the medical field (Bethel University, 2015). Since legislation did not pass this law after the three-year time limit, in 2003, DHHS then broadcasted a specific set of rules concerning the use and disclosure of medical records, requiring health care providers to comply. In premise, the HIPPA act is nothing more than a disclosure…

    • 827 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    It is important to know and identify when and how the breach occurred in order to accurately determine who was affected in the breach. Once the breach has been validated, the company needs to assign a manager who will handle the incident and have a response team ready in order to mitigate the problem. This team should handle all actions such as legal, IT, finance, risk management, and even media relations (Privacy Technical Assistance Center, 2012). If the authorities or law enforcement needs to be involved in the breach, then the team will determine whether they need to be contacted for further investigation. Once all the necessary information has been recovered, it is to determine whether the parties involved should be notified and what needs to be done in order to accommodate the persons involved, such as free credit report for a year.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Target breach ranks one of the worst ever security breaches in history. Not only did someone hack into Target’s security system, but it was during peak holiday months when Target stores are overrun with customers getting ready for the upcoming holiday. In this paper, the reader will learn about the history of cyber security attacks, the Target Security Breach in detail along with the future problems…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Opm Hack

    • 896 Words
    • 4 Pages

    With the expansion of technology and the Internet, people fiercely protect their online identity to include regularly changing and safeguarding online passwords, upgrading security scans to keeps computers protected from viruses. However, personal and sensitive information exists online, and it is vulnerable even when safety measures are in place. This vulnerability led to a compromise of the Office of Personnel Management (OPM) database and sensitive information was obtained by unauthorized sources. Living in the information age is exciting and convenient. People can sit at their computers and conduct research without ever having to consult a print-version encyclopedia, shop without ever having to leave the comforts of their…

    • 896 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Case Study Equifax

    • 781 Words
    • 4 Pages

    David Meyers Principles of PR Kenna Griffin Case study 4 – Equifax 15 September 2017 Equifax, a consumer credit reporting agency had its security breached. This issue is affecting individuals all over the world. Personal information of people has been accessed by cyber criminals who hacked into the database of the organization. It is known as one of the worst hacks ever due to its range and the information that was exposed to the public.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays